Some things in life are priceless… your business should be one of them. That is why we believe no business is too small. Advanced Communications & Maintenance offers a FREE, no obligation, consultation regarding technology solutions to all businesses. From telephones to computers to website design, we can help you achieve peace of mind… Now that’s priceless! Contact our Regional Project Manager, Audrey Edwards, for more information! Office: 239-931-4636, ext. 301, cell: 239-887-1890 or e-mail
This e-mail address is being protected from spambots. You need JavaScript enabled to view it

As we continue to be on alert for the Conficker worm and other worms and viruses, Microsoft recently reported an increase in attacks on PCs via bogus security software. Since the Conficker alert started going around, more computer users started looking for security programs online to protect their system. Unfortunately, many of the online programs turned out to be agents for worms and viruses. Microsoft labels these programs “scareware.” According to Microsoft, “more security-conscious consumers are being tricked by insistent or alarming pop-up warnings into paying for protection which, unknown to them, is actually malware designed to steal personal information.” As we reported in our previous blog entry, Conficker works its way into a PC and allows that PC to be controlled remotely. We can help you protect your computer systems. Don’t trust everything you see online. Feel free to contact us with any questions.

Thank you for reading this SPECIAL VIRUS ALERT. It has come to our attention in the past couple of days that clients are not aware of this VERY REAL VIRUS nor have their IT people whether contracted or in-house. Advanced Communications & Maintenance has been preparing for this and have preventative and or corrective actions in place!

Summary

Win32/Conficker is a worm that infects other computers across a network by exploiting a vulnerability in the Windows Server service (SVCHOST.EXE). If the vulnerability is successfully exploited, it could allow remote code execution when file sharing is enabled. Depending on the specific variant, it may also spread via removable drives and by exploiting weak passwords. It disables several important system services and security products and downloads arbitrary files.